Greenbone Cloud Service – Manual¶
This is the manual for the Greenbone Cloud Service.
The Greenbone Cloud Service is under constant development. This manual attempts to always document the latest version. It is, however, possible that latest functionalities have not been captured in this manual.
Should you have additional notes or error corrections for this manual, contact the Greenbone Enterprise Support.
The copyright for this manual is held by the Greenbone AG. The license information for the feed used by the Greenbone Cloud Service can be found at https://www.greenbone.net/en/license-information/. Greenbone and the Greenbone logo are registered trademarks of the Greenbone AG. Other logos and registered trademarks used within this manual are the property of their respective owners and are used only for explanatory purposes.
- 1 Introduction
- 2 Read Before Use
- 3 Guideline for Using the Greenbone Cloud Service
- 4 Getting to Know and Accessing the Platform
- 5 Configuring the User, Team, and Account Settings
- 6 Scanning a System
- 6.1 Using the Task Wizard for a Scan
- 6.2 Configuring a Simple Scan Manually
- 6.3 Configuring an Authenticated Scan Using Local Security Checks
- 6.4 Performing a Scheduled Scan
- 6.5 Managing Targets
- 6.6 Managing Gateways
- 6.7 Managing Tasks
- 6.8 Scan Configurations
- 6.9 Port Lists
- 6.10 Using Notifications
- 6.11 Obstacles While Scanning
- 7 Reports and Vulnerability Management
- 8 Frequently Asked Questions
- 8.1 Which Firewall Access Rules Are Necessary for the Communication Between the Greenbone Scan Cluster (GSC) and the VPN Gateway?
- 8.2 Which Firewall Access Rules Are Necessary for the Communication Between the Greenbone Scan Cluster (GSC) and External Targets?
- 8.3 Which Technology Is Used for the VPN Connection?
- 8.4 What Has to Be Done if MAC-NAT Does Not Work?
- 8.5 What Happens to the User Account When the Subscription Ends?
- 8.6 Why is the Scanning Process so Slow?
- 8.7 Why Do the Results for the Same Target Differ across Several Consecutive Scans?
- 8.8 Why Does a VNC Dialog Appear on the Scanned Target System?
- 8.9 Why Does the Scan Trigger Alarms on Other Security Tools?
- 9 Glossary
- 9.1 CERT-Bund Advisory
- 9.2 CPE
- 9.3 CVE
- 9.4 CVSS
- 9.5 DFN-CERT Advisory
- 9.6 Greenbone Enterprise Feed
- 9.7 Host
- 9.8 Vulnerability Test (VT)
- 9.9 OVAL Definition
- 9.10 Port List
- 9.11 Quality of Detection (QoD)
- 9.12 Report
- 9.13 Result
- 9.14 Scan
- 9.15 Scanner
- 9.16 Scan Configuration
- 9.17 Schedule
- 9.18 Severity
- 9.19 Solution Type
- 9.20 Target
- 9.21 Task